Strategies for a Successful Security and Digital Transformation

Similar documents
A Fabric Approach to Network Security

Build a Software-Defined Network to Defend your Business

Securing Digital Transformation

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Cybersecurity Roadmap: Global Healthcare Security Architecture

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Best Practices in Securing a Multicloud World

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

IT Security: Managing a New Reality

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Evolution Of Cyber Threats & Defense Approaches

FOR FINANCIAL SERVICES ORGANIZATIONS

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

6 KEY SECURITY REQUIREMENTS

Cisco Start. IT solutions designed to propel your business

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

GDPR Update and ENISA guidelines

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

deep (i) the most advanced solution for managed security services

Combating Cyber Risk in the Supply Chain

Transforming your network for the digital economy

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Software-Defined Secure Networks in Action

Building a Resilient Security Posture for Effective Breach Prevention

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

The Windstream Enterprise Advantage for Banking

Orange: Cisco & Orange: a human touch for a digital experience

What To Ask Your SD-WAN Vendor

Advanced Endpoint Protection

Trends and Challenges We now live in a data-driven economy A recent Gartner report discussing NetOps 2.0 stated, NetOps teams must embrace practices a

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

THE EVOLUTION OF SIEM

The threat landscape is constantly

The Future of Network Infrastructure & Management

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

Cloud-Enable Your District s Network For Digital Learning

with Advanced Protection

Managed Endpoint Defense

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Mitigating Branch Office Risks with SD-WAN

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Maximum Security with Minimum Impact : Going Beyond Next Gen

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

Preparing your network for the next wave of innovation

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

CSP 2017 Network Virtualisation and Security Scott McKinnon

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Automated Threat Management - in Real Time. Vectra Networks

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

The Future of Threat Prevention

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Cyber Security. It s not just about technology. May 2017

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

An Aflac Case Study: Moving a Security Program from Defense to Offense

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Gladiator Incident Alert

Cybersecurity for Service Providers

Cyber-Threats and Countermeasures in Financial Sector

SAFE JOURNEY TO THE CLOUD. Eric Meadows Cloud Security Team

ENDPOINT SECURITY AND THE CLOUD: HOW TO APPLY PREDICTIVE ANALYTICS AND BIG DATA

CloudSOC and Security.cloud for Microsoft Office 365

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Cybersecurity in Government

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Oracle Trust Fabric Securing the Cloud Journey

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Designing and Building a Cybersecurity Program

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Copyright 2011 Trend Micro Inc.

A global technology leader approaching $42B in sales with 57,000 people, and customers in 160+ countries LENOVO. ALL RIGHTS RESERVED

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security.

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

An Aflac Case Study: Moving a Security Program from Defense to Offense

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Traditional Security Solutions Have Reached Their Limit

Next Generation Authentication

Transcription:

#RSAC SESSION ID: GPS-F02A Strategies for a Successful Security and Digital Transformation Jonathan Nguyen-Duy Vice President, Strategic Programs jnguyenduy@fortinet.com

AGENDA 2017 Digital transformation & cybersecurity outlook New cyber realities Distributed network segmentation & virtualization Applying security for digital transformation Summary

DX & Fourth Industrial Revolution 1st Mechanization, water power, steam power 2nd Mass Production, Assembly Line, Electricity Digitization to innovation New business models 3rd Demand & supply 4th side changes Better customer engagement Computer and Cyber Physical Systems Automation Everything is accelerated 1780 1870 1970 2016 Source: Christoph Roser at Allaboutlean.com

Digital Transformation Accelerates Everything

Digital Transformation & Disruption Disruption of traditional enterprises challenged by digital native competitors Definition: Transformation based on leveraging data via technologies to generate deep insights that drive exponential business growth Objective: Data -driven business to enrich customer experience via customer targeting & engagement

Digital Transformation (DX) DX enabled by key technologies Distributed computing (Edge/Data Center/Cloud) Ubiquitous broadband (5G) Internet-of-things Big data analytics Key trends Omni-dimensional customer engagement Expanding number of devices & technologies Complexity & security challenges Forces a re-thinking of security From the data center, to the cloud, to the edge and IoT

Cyber Complexity Requires a New Approach #RSAC Average enterprise: 200+ apps 70+ security devices & services 20+ connected devices per person 2+ public & private clouds 3 TB+ per person per day Shadow IT Supply chain interconnections DX initiatives Big data IoT Virtualization

Fortinet Threat Landscape Report CISO role productivity vs security DX: Cloud, IoT, 5G & data analytics Automated & opportunistic attacks Disappearing perimeter Complexity and Persistence are key Complexity of threats Overwhelmed IT teams Shortage of skills No need to compromise Distributed network segmentation Virtualization Best-in-class tools & processes

2017 Verizon Data Breach Investigations Report Who s behind the breaches? 75% perpetrated by outsiders 25% involved internal actors 18% conducted by state-affiliated actors 3% featured multiple parties 2% involved partners 51% involved organized criminal groups What tactics do they use? 51% of breaches included malware 62% of breaches featured hacking 81% of hacking-related breaches used stolen and/or weak passwords Attacks fall into 9 well known categories

Existing approaches are not working Missing basics due to complexity Cyber is complex is growing IT teams are overwhelmed Perimeters are disappearing Determined threat actors can break anything IT teams are missing security basics Less awareness and control Need to re-think security in 4 th Industrial Revolution

Distributed Segmentation & Virtualization Complexity and persistence can be used by us or against us Solution: make it easier for good guys and harder for bad actors Increase automation, segmentation & virtualization Increase difficulty and expense Learn from the bad actors

Distributed Segmentation & Virtualization Requirements (What to look for in vendors) Sandbox Visibility, Detection & Response DATA CENTER/PRIVATE CLOUD Endpoint Protection Secure Access Point NGFW Top-of-Rack Internal Segmentation FW Switching Web Servers Internal Segmentation FW SDN, Virtual Firewall Application Delivery Controller Database Protection CAMPUS IP Video Security Web Application Firewall Internal Segmentation FW Email Server PUBLIC CLOUDS Client Devices Client Devices Distributed Ent FW LTE Extension DCFW/ NGFW Email Security Internal Segmentation FW DDoS Protection Sandbox BRANCH OFFICE

Distributed Segmentation & Virtualization Requirements (What to look for in vendors) Unified security framework Certified and best-in-class tech and CSPs People, processes, technology, infrastructure 5 key questions to ask Allow auditing or pen testing? Are my apps ready for the cloud? Is your security scalable? Is your security aware? Do you offer segmentation? PUBLIC CLOUDS

Applying Distributed Network Segmentation & Virtualization SIEM/Analytics Branch or Tower Micro-segmentation Form factor: Virtual/Whitebox Branch or Tower Segmentation FW Form factor: Virtual/Whitebox DC / Cloud Services DC Segmentation FW Form factor: Appliance enb 3G/4G/5G wireless DC / Private Cloud UCPE Branch Access and off-load Transport / SDWAN Consumer Access and off-load

Next Steps Applying Insights Next week confirm current state Audit & pen test Identify critical workloads, systems and assets In three months move to steady state: High priority fixes & segmentation Determine proper controls, current state & future state IR retainer and darkweb services Within six months you should: Develop business case Select a security system which allows proactive policy to be set according to your organization s needs Implement project to protect all critical systems

Summary Digital transformation and threats driving distributed network segmentation and virtualization Cyber complexity will increase as Digital Transformation is widely adopted Look for solutions with end-to-end automated visibility, detection & response Network segmentation and virtualization is practical way forward

#RSAC